{"title":"Disclosing or Protecting? Teenagers' Online Self-Disclosure","authors":"M. Walrave, W. Heirman","doi":"10.1007/978-94-007-0641-5_14","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_14","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project \"Open Trusted Computing\"","authors":"A. Weber, Dirk Weber","doi":"10.1007/978-94-007-0641-5_9","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_9","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115989628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization","authors":"Norberto Nuno Gomes de Andrade","doi":"10.1007/978-94-007-0641-5_4","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_4","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Noise in the Archive: Oblivion in the Age of Total Recall","authors":"Jean-François Blanchette","doi":"10.1007/978-94-007-0641-5_2","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_2","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Casola, Raffaele Lettiero, M. Rak, Umberto Villano
{"title":"Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study","authors":"V. Casola, Raffaele Lettiero, M. Rak, Umberto Villano","doi":"10.1007/978-94-007-0641-5_20","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_20","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"2a 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128196763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions","authors":"J. Cas","doi":"10.1007/978-94-007-0641-5_7","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_7","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125064990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, Wendy Hui Wang
{"title":"Privacy-Preserving Data Mining from Outsourced Databases","authors":"F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, Wendy Hui Wang","doi":"10.1007/978-94-007-0641-5_19","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_19","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keeping Up Appearances: Audience Segregation in Social Network Sites","authors":"B. V. D. Berg, R. Leenes","doi":"10.1007/978-94-007-0641-5_10","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_10","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Poullet, J.-M. Van Gyseghem, Jean-Philippe Moiny, J. Gérard, Claire Gayrel
{"title":"Data Protection in the Clouds","authors":"Y. Poullet, J.-M. Van Gyseghem, Jean-Philippe Moiny, J. Gérard, Claire Gayrel","doi":"10.1007/978-94-007-0641-5_18","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_18","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?)","authors":"K. Vries, R. Bellanova, P. Hert, S. Gutwirth","doi":"10.1007/978-94-007-0641-5_1","DOIUrl":"https://doi.org/10.1007/978-94-007-0641-5_1","url":null,"abstract":"","PeriodicalId":428339,"journal":{"name":"Computers, Privacy and Data Protection","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}